mailing list archives
From: "preeth k" <k_preeth () rediffmail com>
Date: 22 Feb 2005 09:36:21 -0000
I am designing a Network Intrusion Detection System in Linux. I want to create a database of intrusion signatures
using MySQL database. Can anyone please give an idea about what all fields I have to include, how to store packet
payload, which pattern matching algorithm to use, etc. (Will Boyer-Moore algorithm be appropriate for pattern matching
Full-Disclosure - We believe in it.
- IDS Signatures preeth k (Feb 22)